This website uses cookies, which are necessary for you to login to the My ICCA section, integrate social media and track visits to our website. ICCA is legally obliged to ask your permission to use cookies and to inform you about how we use them. By continuing to use our website you are accepting our use of cookies as described in our Privacy Policy. Find Out MoreContinue
Remember Associations only: Forgot password

ICCA Resource

First Article Previous Article Next Article Last Article

ICCA Association Portal - Case studies

How to protect your meeting from cyber threats

As he began his presentation on cyber security at meetings, Michael Robinson showed a slide to the audience. “Recognize this?” he asked. We all did. It was the landing page for logging in to the hotel’s Wi-Fi network, with fields for a guest’s last name and room number. Robinson then told us that the page was a fake, one he’d set up within 15 minutes of getting into his hotel room. And with a router the size of a deck of cards, he could have quickly set up a network with the same name as the hotel’s network, and dumped unsuspecting users over to this innocent-looking landing page. None of us would have been the wiser, but all our data would be ripe for the picking by this MitM (man-in-the-middle attack—that’s some cryptography/computer security lingo).

To read the full article, please follow this link to the website of our media member MEETINGSNET Magazines & E-Media, Penton Media.

First Article Previous Article Next Article Last Article

ICCA Resource Home